This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Combating Spam, Spyware, and Other Desktop Intrusions: Legal Considerations in Operating Trusted Intermediary Technologies
May/June 2006 (vol. 4 no. 3)
pp. 45-51
To prevent spam, spyware, and other intrusions, network operators and software providers deploy trusted intermediary technologies to protect their end users and networks. These technologies can be designed to anticipate legal challenges that may be raised by the companies and other actors whose behaviors they inhibit.
Index Terms:
spyware, spam, network operations
Citation:
Charles D. Curran, "Combating Spam, Spyware, and Other Desktop Intrusions: Legal Considerations in Operating Trusted Intermediary Technologies," IEEE Security & Privacy, vol. 4, no. 3, pp. 45-51, May-June 2006, doi:10.1109/MSP.2006.60
Usage of this product signifies your acceptance of the Terms of Use.